| 國立臺灣科技大學 |
2009 |
Secure key management scheme for hierarchical access control based on ECC
|
Lin Y.-L.; Hsu C.-L.; Wu T.-C.; Yen S.-L.; Tseng C.-L. |
| 淡江大學 |
2006-09 |
Secure Key Management Scheme for Wireless LAN
|
黃仁俊; Hwang, Ren-junn; Lai, Chih-hua; Chen, Yun-ru |
| 國立交通大學 |
2014-12-08T15:39:32Z |
Secure key-evolving for public key cryptosystems based on the discrete logarithm problem
|
Lu, CF; Shieh, SP |
| 國立臺灣科技大學 |
2017 |
Secure location tracking of femtocells in heterogeneous cellular networks
|
Cheng, S.-M.;Wang, Y.-J.;Chen, Y.-C. |
| 國立交通大學 |
2017-04-21T06:48:59Z |
Secure MIMO Transmission via Compressive Sensing
|
Lin, Chia-Hua; Tsai, Shang-Ho (Lawrence); Lin, Yuan-Pei |
| 國立交通大學 |
2018-08-21T05:53:33Z |
Secure Mobile-Phone Based Visible Light Communications With Different Noise-Ratio Light-Panel
|
Chow, Chi-Wai; Shiu, Ruei-Jie; Liu, Yen-Chun; Yeh, Chien-Hung; Liao, Xin-Lan; Lin, Kun-Hsien; Wang, Yi-Chang; Chen, Yi-Yuan |
| 國立臺灣海洋大學 |
2007-07-11 |
Secure multicast in dynamic environments
|
Chun-Ying Huang;Yun-Peng Chiu;Kuan-Ta Chen;Chin-Laung Lei |
| 國立臺灣大學 |
2007 |
Secure multicast in dynamic environments
|
Huang, Chun-Ying; Chiu, Yun-Peng; Chen, Kuan-Ta; Lei, Chin-Laung |
| 臺大學術典藏 |
2018-09-10T06:35:01Z |
Secure Multicast in Dynamic Environments
|
Chun-Ying Huang; Yun-Peng Chiu; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI |
| 國立臺灣海洋大學 |
2005 |
Secure Multicast Using Proxy Encryption
|
Yun-Peng Chiu;Chin-Laung Lei;Chun-Ying Huang |
| 臺大學術典藏 |
2018-09-10T05:26:48Z |
Secure Multicast Using Proxy Encryption
|
Y. P. Chiu; C. L. Lei; C. Y. Huang; CHIN-LAUNG LEI |
| 亞洲大學 |
2016-07 |
Secure Multicasting of Images via Joint Privacy-Preserving Fingerprinting, Decryption, and Authentication
|
林智揚;Chih-Yang Lin;Kahlil Muchtar; Chia-Hung Yeh;*;Chun-Shien Lu |
| 國立交通大學 |
2014-12-08T15:29:33Z |
Secure Network Mobility (SeNEMO) for Real-Time Applications
|
Chen, Tuan-Che; Chen, Jyh-Cheng; Liu, Zong-Hua |
| 國立高雄師範大學 |
1997-10-15 |
Secure Official Document Mail Systems for Office Automation
|
孫培真;葉道明; C. H. Yang;S. L. Yen;Hwang David Liu;Kuei Liu;B. S. Jeng;K. Y. Chang;M. S. Chang;Y. L. Cheng;J. L. Liang;D. M. Shien |
| 東海大學 |
2005-03-25 |
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing
|
林祝興; Chu-Hsing Lin , and Hsiu-Hsia Lin |
| 東海大學 |
2005-03-28 |
Secure one-round tripartite authenticated key agreement protocol from weil pairing??
|
Lin, C.-H., Lin, H.-H. |
| 國立臺灣大學 |
2004-03 |
Secure online examination architecture based on distributed firewall
|
Pan, Chi-Chien; Yang, Kai-Hsiang; Lee, Tzao-Lin |
| 國立政治大學 |
2011-03 |
Secure Password Based Authentication Protocol to Thwart Online Dictionary Attacks
|
Sood, Sandeep K. |
| 東海大學 |
2013-10-01 |
Secure PHR access control scheme for healthcare application clouds
|
Liu, C.-H.; Lin, F.-Q.; Chiang, D.-L.; Chen, T.-L.; Chen, C.-S.; Lin, H.-Y.; Chung, Y.-F.; Chen, T.-S. |
| 國立成功大學 |
2018-12 |
Secure Quantum Communication Scheme for Six-Qubit Decoherence-Free States
|
Tsai;Chih-Lun;Hwang;Tzonelih |
| 臺大學術典藏 |
2018-09-10T07:08:27Z |
Secure Quantum Packet Transmission Mechanism for Wireless Networks
|
T. S. Lin; S. Y. Kuo; SY-YEN KUO |
| 實踐大學 |
1997 |
Secure registration protocol for wireless internet
|
Chin, Le-Pond |
| 淡江大學 |
2008-06-17 |
Secure remote control model for information appliances
|
Shieh, Wen-gong; Wang, Jian-min; Horng, Wen-bing |
| 中國文化大學 |
2008 |
Secure remote control model for information appliances
|
謝文恭等著 |
| 國立彰化師範大學 |
2006-06 |
Secure Reputation System Based on Group Transitivity and Peer's Classification for Peer-to-Peer Networks
|
Kone, M. ; Tseng, Yuh-Min; Jan, J. K. |